Fraud Protection Warnings

Warning of fraud due to ill-considered and possibly careless use of the functions of the Hypersoft // system:

Best practice against fraud with fax functions

It makes a difference whether there is a receipt printer at every ordering point (kitchen, bar) or whether the receipt is brought there by the operator. For example, one of our specialist retail partners accidentally discovered a kind of code on the order receipts of a customer with high product losses, with which the operator and kitchen agreed further "order adjustments". For this purpose, small dots were made in the four corners of a receipt for further article orders that should not (for the time being) be booked in the process. Top left was lunch 1, top right 2, etc. A receipt printer for the kitchen and a new cook solved the problem for the future.

Today's popular fax functions enable staff to quickly note down almost any request by hand on the thermal receipt. But you could also write "2 schnitzels without a receipt"!

You could reflexively try to record and check all these notes, but in practice this is just as unlikely to happen as watching endless video recordings.

Solutions by fax Alternatives...

Instead of fax functions, they use info articles and info requests that are posted from the database. No ice, no lemon, little salt, etc. Over time, you get a library of special requests from guests and can also influence what you support and what you don't: "a large cola in 2 small glasses please". For special cases, a "Kitchen please wait..." be specially monitored as a reporting item if required. The operators and recipients of the orders are trained on the desired changes (they can then also book price changes) and everything works as desired. The fax function can also be used for exceptions. Whether they then have the faxes separated or simply agree on consequences for the above misuse variants is up to them. If nothing helps, you can switch off the fax functions at various points in the programmes.

See: keyboard input POS Attach text, Transaction Option Menu, mPOS Fax function allowed and Hypersoft mPOS fax and SMS function and CLOU MOBILE for Orderman Fax Function Faxfunktion erlaubt.

An uncoordinated and trained fax function is an easily avoidable risk and the coordination has additional potential to increase quality.

Best practice against fraud via SQL accesses

Open SQL databases are not only technically superior to proprietary or closed data beacons, their openness also enables possibilities for manipulation. This is not dealt with in almost all systems of the market companions and usually goes unmentioned into your responsibility. We mention this to make it clear that our treatment represents a particular safety and strength compared to the non-treatment compared.

Together with the installation of our Actian Pervasive SQL database a PSQL Control Center is installed by the manufacturer. You should protect this against access or not make it accessible without consideration.

For our support and cooperation with you, we have provided our own SQL Control Center. This can be used either directly by our experts or as instructed by them if necessary. For the operation in Germany with TSE an access restrictionis activated there.

SQL Center with active TSE access restriction...

In a system with an active TSE in which signed bookings already exist, this is indicated in the SQL Center:

Any SQL statements that can be freely created are analyzed and deletions / updates etc. in all journal tables are prevented. This is visualized by the red background. If a "forbidden" statement is issued, this is indicated by a message TSE restriction and the command is not executed. Please also note that regardless of this protection, since 2011 the program can log Fraud Protection Status Booking Journalinterventions in the booking journal.

Further security with the Status Booking Journal programme...

Whether through backdoors, neglect of security or simple use of third party SQL programs, there is no guarantee per se that SQL access will occur. However, it is still possible to check the posting journal for changes. That is why Hypersoft has developed a kind of proprietary encryption for each individual booking record and a program to evaluate this key for you. This allows you to check from time to time whether someone has made unauthorised changes to booking data. This check is also carried out by the system for your security when data is exported for tax audits. You see Fraud Protection Status Booking Journal.


Back to the parent page: fraud protection